303,013 results
Search Results
52. Regulatory Considerations on Centralized Aspects of DeFi Managed by DAOs
53. Risk Framework for Bitcoin Custody Operation with the Revault Protocol
54. Mining for Privacy: How to Bootstrap a Snarky Blockchain
55. Another Look at Extraction and Randomization of Groth’s zk-SNARK
56. Generic Plaintext Equality and Inequality Proofs
57. Somewhere Statistically Binding Commitment Schemes with Applications
58. BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
59. SoK: Securing Email—A Stakeholder-Based Analysis
60. : Efficient Comparison for Secure Multi-Party Computation
61. Shielded Computations in Smart Contracts Overcoming Forks
62. The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach
63. Timelocked Bribing
64. A Formal Model of Algorand Smart Contracts
65. DAHash: Distribution Aware Tuning of Password Hashing Costs
66. Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand
67. High-Threshold AVSS with Optimal Communication Complexity
68. Under the Hood of the Ethereum Gossip Protocol
69. Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading
70. Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications
71. Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications
72. Faster Homomorphic Encryption over GPGPUs via Hierarchical DGT
73. Reparo: Publicly Verifiable Layer to Repair Blockchains
74. Efficient State Management in Distributed Ledgers
75. Lost in Transmission: Investigating Filtering of COVID-19 Websites
76. What’s in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics
77. Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality
78. Instant Block Confirmation in the Sleepy Model
79. Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients
80. HaPPY-Mine: Designing a Mining Reward Function
81. Payment Trees: Low Collateral Payments for Payment Channel Networks
82. PoSAT: Proof-of-Work Availability and Unpredictability, Without the Work
83. SoK: Communication Across Distributed Ledgers
84. Explanation Framework for Intrusion Detection
85. Proposal for requirements on industrial AI solutions
86. Prediction of Batch Processes Runtime Applying Dynamic Time Warping and Survival Analysis
87. Improvement of the prediction quality of electrical load profiles with artificial neural networks
88. Machine learning for reconstruction of highly porous structures from FIB-SEM nano-tomographic data
89. Hardening Deep Neural Networks in Condition Monitoring Systems against Adversarial Example Attacks
90. New Standards for E-Voting Systems: Reflections on Source Code Examinations
91. Post-quantum Online Voting Scheme
92. Cast-as-Intended: A Formal Definition and Case Studies
93. Measuring Illicit Activity in DeFi: The Case of Ethereum
94. Global Order Routing on Exchange Networks
95. Wendy Grows Up: More Order Fairness
96. A Game-Theoretic Analysis of Cross-ledger Swaps with Packetized Payments
97. Optimal Fees for Geometric Mean Market Makers
98. How to Exploit a DeFi Project
99. Measuring Asset Composability as a Proxy for DeFi Integration
100. Coins, Covid, Keynes and K-Shaped Recovery
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.